Questions
Case Study Description - Payment Time Case Study Major consulting firms such as Accenture, Ernst &...

Case Study Description - Payment Time Case Study

Major consulting firms such as Accenture, Ernst & Young Consulting, and Deloitte & Touche Consulting employ statistical analysis to assess the effectiveness of the systems they design for their customers. In this case, a consulting firm has developed an electronic billing system for a Stockton, CA, trucking company. The system sends invoices electronically to each customer’s computer and allows customers to easily check and correct errors. It is hoped the new billing system will substantially reduce the amount of time it takes customers to make payments. Typical payment times—measured from the date on an invoice to the date payment is received—using the trucking company’s old billing system had been 39 days or more. This exceeded the industry standard payment time of 30 days.

The new billing system does not automatically compute the payment time for each invoice because there is no continuing need for this information. The management consulting firm believes the new system will reduce the mean bill payment time by more than 50 percent. The mean payment time using the old billing system was approximately equal to, but no less than, 39 days. Therefore, if µ denotes the new mean payment time, the consulting firm believes that µ will be less than 19.5 days. Therefore, to assess the system’s effectiveness (whether µ < 19.5 days), the consulting firm selects a random sample of 65 invoices from the 7,823 invoices processed during the first three months of the new system’s operation. Whereas this is the first time the consulting company has installed an electronic billing system in a trucking company, the firm has installed electronic billing systems in other types of companies.

Analysis of results from these other companies show, although the population mean payment time varies from company to company, the population standard deviation of payment times is the same for different companies and equals 4.2 days. The payment times for the 65 sample invoices have been taken and the sample mean has been calculated to be 18.10 days. If this sample can be used to establish that new billing system substantially reduces payment times, the consulting firm plans to market the system to other trucking firms.

Develop a 600-word Microsoft Word report including the following calculations and using the information to determine whether the new billing system has reduced the mean bill payment time:

  • Assuming the standard deviation of the payment times for all payments is 4.2 days, construct a 95% confidence interval estimate to determine whether the new billing system was effective. State the interpretation of 95% confidence interval and state whether or not the billing system was effective.
  • Using the 95% confidence interval, can we be 95% confident that µ ≤ 19.5 days?
  • Using the 99% confidence interval, can we be 99% confident that µ ≤ 19.5 days?
  • If the population mean payment time is 19.5 days, what is the probability of observing a sample mean payment time of 65 invoices less than or equal to 18.10 days?

In: Statistics and Probability

Rio’s [Rio Tino Ltd] latest climate change report, released in February, says that it has modelled...

Rio’s [Rio Tino Ltd] latest climate change report, released in February, says that it has modelled the likely performance of its assets at a range of carbon prices, including the global $US120-a-tonne equivalent that experts say are probably necessary to keep global warming to less than 1.5C.

Rio concedes such a price, combined with other carbon abatement measures, would cut margins at its dominant iron ore division, which delivered $US17bn in underlying earnings in 2019, and threaten the viability of its two Australian aluminium smelters powered by fossil fuels.

“The potential downsides to iron ore revenues from a greater use of scrap across the steel value chain are expected to be offset by upsides for aluminium and copper — which are both essential for the electrification of the global energy system, including electric vehicles, and the deployment of low-carbon power solutions such as solar and wind,” Rio said.

“Importantly, the competitive position of our assets, both on industry cash cost and carbon intensity curves, is expected to protect the margins of our assets, even for commodities such as iron ore where we may face a negative impact on demand and price. In the case of aluminium, the attractiveness of our hydro-based assets is expected to increase relative to coal-based smelters, which would face increased carbon costs that may result in higher aluminium prices.”

Rio has said a carbon price is an “indispensable” part of any strategy to combat climate change.

It says its greatest fear about the move to a carbon price as a means of combating climate change, however, was that the same price would not be applied by all global governments, putting some of its assets at a competitive disadvantage against producers in other jurisdictions.

While Rio has set a goal of reducing its own carbon emissions by 15 per cent by 2030, from 2018 levels, it has so far resisted pressure to follow the lead of rivals such as BHP and Vale and set goals for the reduction of so- called scope 3 emissions — those attributable to customers that buy it products, rather than its own operations.

On Thursday Rio’s resistance was met with a strong backlash from institutional investors, with almost 37 per cent of votes at its annual shareholder meeting on Thursday backing a resolution calling on the company to match the promises made by its major competitors.

Extract from Evans, N. Rio Tinto chairman Simon Thompson linked to carbon price pledge. The Australian. 8 May 2020.

Required:

a) From the content above, explain fully what theories from ACC30008 can be used to explain:
i. Rio’s response to the prospect of a price on carbon (maximum word limit 500 words) ( 8 marks)

ii. TheresponsefromRio’sinstitutionalinvestors?(Maximumwordlimit500words) (8marks) b) What is the meaning of the term ‘underlying earnings’ used by Rio Tinto Ltd in explaining the impact

on its iron ore division of putting a price on carbon? (maximum word limit 250 words)

In: Accounting

are provided with the unadjusted trial balance (Microsoft® Excel) and your manager’s meeting notes and questions...

are provided with the unadjusted trial balance (Microsoft® Excel) and your manager’s meeting notes and questions (Microsoft® Word) for your new tax client – Phoenix Medical. 2. Following the notes, modify the unadjusted trial balance to generate a trial balance workpaper (in Microsoft® Excel) that includes: a. Adjusting Journal Entries b. Adjusted Book Income c. Tax Journal Entries d. Taxable Income e. Answers to your manager’s questions (Microsoft® Word or Excel). 3. The client depends on you, the CPA, to provide journal entries for activity in fixed assets. While discussing fixed assets, the client divulges that he got a great deal to upgrade his laser dermatology equipment. Ultimately, you find out that $569,888 of new equipment was purchased and placed in service on 6/18/2015. 4. Furthermore, and much after the fact, you discover that old medical equipment was sold to an unrelated party for $75,000 cash. The original cost of the equipment was $300,000 and it was fully depreciated (no Sec. 179). The cash was deposited in one of the shareholders personal accounts. a. Provide a journal entry to calculate the gain on sale and adjust the fixed asset and accumulated depreciation accounts. b. What is the nature of this gain? The nature of this gain is going to be long term since it is over more than one year. c. Could the Dr. have structured this sale in a different way to avoid taxable income? How? Yes only if the equiptment was gifted to a spouce then there would not have been any income tax. 5. The client depends on his accountant to provide a journal entry for the annual depreciation expense. They have adopted a policy of treating book depreciation equal to tax depreciation. Depreciation expense for the year will include: a. Depreciation on assets placed in service prior to 2015 is: $86,769 b. Maximize Sec. 179 expense on assets placed in service in 2015. c. Take Sec. 168(k) – 50% Bonus – on new equipment if applicable.

Week 3 Determine Taxable Income: 1. Determine taxable income. Show all adjustments in the Microsoft® Excel spreadsheet. Footnote references are provided to assist you. 2. The Dr. has filed his prior tax returns on the cash basis. a. What questions will you ask to be sure he can continue to file on the cash basis? 3. You find that in 2015, the Dr. qualifies, and choose to file on the cash basis. His books are kept on the accrual basis. Determine the adjustments needed. 4. No federal taxes were paid in 2014, and no estimated taxes were paid in 2015. 5. Within the state tax expense, you find $4,389 is late payment penalties. 6. While analyzing the financial information, you find that hidden in “Accounts Payable” is $28,953 of accrued salaries. You also find that the salaries were paid in the first week of February. a. Does this have an impact on taxable income? 7. Determine the accrual to cash adjustments for accounts receivable and accounts payable. a. A charitable contribution carryforward of $40,000 is available. b. Included in insurance expense is $12,523 of officers’ life insurance. You determine the company is the beneficiary, and each officer is a greater than 20% shareholder

In: Accounting

Answer the following questions based on your understanding of the content. Precision Manufacturing produces machine parts...

Answer the following questions based on your understanding of the content.
Precision Manufacturing produces machine parts and has nearly 200 production employees and 50 employees in its front office with responsibilities ranging from data entry to marketing. Jackson Smith is the new compensation manager at Precision, and his first task is to implement a merit pay program that would tie to the company’s performance appraisal process. For the last 10 years, all employees have received an annual pay increase, but it has been an across-the-board increase, with all employees receiving the same percentage increase in base pay. Jackson and the company president have agreed that implementing a merit pay program to provide pay increases based on performance would support the company’s competitive strategy by rewarding employee productivity. The first step in developing the merit pay program is to ensure that the performance appraisal process aligns with the proposed program. The purpose in implementing the merit pay program is to provide employees with pay increases as a reward for performance, and, therefore, effective measurement of performance is essential. Jackson must now review the current appraisal process to ensure it will tie to the proposed merit pay program. The current appraisal process is fairly simple. Once each year, the supervisors at Precision provide their employees a written performance appraisal. The supervisors use a generic form to conduct their appraisals, and the same form is used for all employees. The form asks the supervisor to rate the employee on a scale of 1 to 5 in four areas: quantity of work, quality of work, attendance, and attitude. Once the form is completed, the supervisor meets with the employee to share the results. Both the supervisor and the employee sign the form, and then it is placed in the employee’s personnel file. Jackson’s initial research on the appraisals has brought several concerns to his attention. First, employees do not have written job descriptions that clearly state their performance expectations. Further, his review of past appraisals suggests that the supervisors tend to rate all of the employees about the same. Very rarely is an employee rated exceptionally high or low; most are rated as average. Finally, it seems that employees and supervisors communicate very little
about performance. Aside from the one meeting a year to deliver the performance appraisal, the supervisors tend to talk to employees about their performances only if the employee is having a problem. Jackson knows he has a lot of work ahead of him to create a performance appraisal process that will provide a reliable assessment to support a merit pay program. First, he must clearly identify the problems with the current performance appraisal process, and then he must lay out a plan to correct any deficiencies.
Question 1: What are some problems with Precision’s performance appraisal process that might cause challenges for Jackson to implement a merit pay program? (50 Marks; 500-word limit)
Question 2: As an HR professional, how would you advise Jack on improving the current performance appraisal process and aligning it to the pay-for-performance plan? (50 Marks; 500-word limit)

In: Operations Management

XML and JAVA Write a Java program that meets these requirements. It is important you follow...

XML and JAVA

Write a Java program that meets these requirements. It is important you follow these requirements closely.

• Create a NetBeans project named LastnameAssign1. Change Lastname to your last name. For example, my project would be named NicholsonAssign1.

• In the Java file, print a welcome message that includes your full name.

• The program should prompt for an XML filename to write to o The filename entered must end with .xml and have at least one letter before the period. If it does not, print a warning and prompt again. Keep nagging the user until a proper file name is entered.

• Prompt the user for 3 integers.

o The three integers represent red, blue, and green channel values for a color. o Process the numbers according to the instructions below

o Once you have handled the 3 input values, prompt the user again o Keep prompting the user for 3 integers until the user enters the single word DONE

o Reading input should not stop for any reason except for when the user enters DONE.

o The user will not mix DONE and the numbers. The user will either enter 3 integers OR the word DONE

• Once the user is done, open the filename entered in the first step and output the data.

o If no numbers were entered, then do not open the file for writing. Simply print a message that no data was entered.

o When 1 or more colors are entered, write out the XML data for each color. See below for the format.

o Sometimes users may enter integer values that are larger than 255 or less than 0. Values like this will need to be “clipped”, that is, converted to good values. For example, if the user enters 300 for red, then the actual red channel value will be 255. If the user entered -10 for the blue channel, then the actual blue channel value will be 0.

You should follow the sample below and your program should exhibit the same behavior. For full credit, your generated XML files must pass validation with NetBeans Check XML.

GENERAL REQUIREMENTS

All Java-related assignments will have the requirements below. While you may find them limiting, their purpose is to help you adopt good programming habits.

1. You should not have one, ginormous main() function. Your program should be modular, that is, define several (more than 2) meaningful functions in addition to main().

2. All functions should have a comment describing their purpose.

3. You may not use the System.exit() function   
4. You must include a comment at the top of your .java file in this format:

/*******************

John Nicholson

CSCI 3020 Section 04

Fall 2019

Assignment 1
This program does ...

*******************/

You should obviously change the name to your name, the section to your section, and write a real description of the program. If this comment is missing, you will automatically lose 50% of the points on the assignment. Your assignment will not be regraded if you do not put in the correct comment.
XML

In: Computer Science

Assignment: Square Matrix ("Caesar Block")Cipher C++ ASSIGNMENTS *REMEMBER IT SHOULD NOT ONLY READ ONE LINE OR...

Assignment: Square Matrix ("Caesar Block")Cipher
C++ ASSIGNMENTS
*REMEMBER IT SHOULD NOT ONLY READ ONE LINE OR A SINGLE WORD 
remember, read, understand, and use the waterpump.cpp program
 will process an arbitrary amount of input text, however long.

Arrange a stream in a two dimensional array of characters by filling up
the array a line at a time, from leftmost column to rightmost column.

DO NOT USE A GETLINE: this program should be able to input an entire library,
not a single line or word.  Remember: we're building tools real people 
would use for real tasks.  Remember, read, and use the "waterpump" 
design, that is why it was provided you.

Then, to encypher the text, print out the array from top row to bottom
row, leftmost column to rightmost colum.

In Programmer Speak, we create a Row-Major character matrix, then print it
as a Column-Major character matrix.

Example:
Here's a message: "meetmeinsaintlouis"

It has 17 characters.  

We need a square array of char to hold it...but 17 isn't a square number.

What's the next-largest square (bigger than 17?)

2 . 2 =  4
3 . 3 =  9
4 . 4 = 16
5 . 5 = 25  HAH!

25.  (And what's the square root of 25?  5 )

So create char matrix[5][5] ;

So write the message into a 5 x 5 square going left to
right/top to bottom:

meetm
einsa
intlo
uisxx
xxxxx

(Note we padded out the extra cells with 'x'.  In reality,
we'd use random letters.)

Print it out going top to bottom THEN left to right:

STOP: BE SURE YOU UNDERSTAND THE PRECEEDING SENTENCE.  CAN YOU SEE
HOW TO DO IT IN YOUR MIND?  If not, keep thinking about it.

Here's the enciphered message:

meiuxeinixentsxtslxxmaexx

input:
Karla: The young woman named Alexandra Borisovna Ostrakhova is your daughter.


OUTPUT:
KonasaoeqauanokurbrnmdvhrnhlgernodwcawdaavaldToABOaurahmlosigbreaertshbzynxirytmo

Tools needed for this Assignment:
std::string 
string::length()
string::erase()
string::[]

If there is ANY EXTRANEOUS TEXT in the stream, (LIKE FROM EXTRA PROMPTS
AND WARNINGS FROM YOUR PROGRAM) your code will only produce gibberish.
We're here to build tools for serious workers to use.  Please keep
that goal uppermost in your mind, and never add anything unnecessary.
Good machines are simple and solid.  Build only good machines.

All contents copyright (C) T.E.H., all rights reserved.  None of this
code may be displayed or stored on any public access or private access
system without the written consent of the author.  This means any and
all commercial cheating ("Homework Helping/Counselling") services.

Since we're desling with functions() in the text this week, let's break down the
parts fo the program into functions:

int side_length(int length)
{
        // call side_length with the length of the message
        // it should return you an integer which is the 
        // correct length of the square array of characters
        // to hold the message, plus any padding characters.
}

int randchar(void)
{
        //return a random lower-case alphabetic character when called
        // note: (((rand() * some multiplier) % 26 )+ 'a') will produce such a character
}

In: Computer Science

HIMT 345 Homework 05: Functions Overview: Examine PyCharm’s “Introduction to Python” samples for Functions. Use PyCharm...

HIMT 345
Homework 05: Functions
Overview: Examine PyCharm’s “Introduction to Python” samples for Functions. Use PyCharm to work along with exercises from Chapter 4. Modify the grade assignment program of Hwk 04 to utilize a function by copying the Hwk04 project and creating the Hwk05 project.
Prior Task Completion:
1. Read Chapter 04
2. View Chapter 04’s video notes.
3. As you view the video, work along with each code sample in PyCharm. The examples used in the video are available for you to experiment with if you downloaded the complete Severance source files for Chapters 3-10.
a) With PyCharm open, locate the .zip file entitled Ch 4 Functions PPT Code Samples.zip.
b) Open each of the project files for that chapter in PyCharm. Note: The code samples are numbered in the order they are covered in the video.
c) Start the video and follow along.
4. Complete Exercises 4.1 – 4.5 (not handed in).
Specifics: PyCharm’s “Introduction to Python” project contains multiple examples giving the basics of conditional expressions (see list at right). Follow the instructions to complete them. (Not handed in.)
Use PyCharm to work along with the video solution for Exercise 4.6 from the textbook. Try to make the same mistakes (and fixes) made by the author. (Not handed in.)
Create a copy of your Hwk04 project file, calling it Hwk05.
1. Highlight the Hwk04 project, select Refactor/Copy.
Important: Do not skip the process of following along with the videos. It is a very important part of the learning process!
2. Give it a New name: of Hwk05 and leave the To directory: in its default state.
Leave the “Open copy in editor” box checked.
3. After clicking OK, if the project fails to open, just open it manually as you would
any project (File | Open | Hwk05 project).
You may immediately delete Hwk04b as it is not needed in this assignment. You may
need to Refactor | Rename both the project name and the existing Hwk04a.py file, as
only the directory was renamed by PyCharm in creating the copy.
Having renamed Hwk04a to Hwk05_YourLastName.py, your task is to determine the
letter grade using a function.
Here is some pseudocode* to guide the process:
(NOTE: The assign_grade function must be declared at the top of the Python file.)
Prompt for the test score, using try-except to verify it is valid
Invoke (call) the function, supplying it the test score and it returning the appropriate
letter grade;
e.g. letter_grade = assign_grade(test_score)
Display the test score and appropriate letter grade.
What to hand in:
Take screen shots of the console window verifying correct handling of bad input as well
as letter grades for one test score in each grade range. Copy the screen shots into a
Word document (filename Hwk05_YourLastName_Screenshots.doc) with your name and
date in the upper right hand corner. Upload the Word doc and the Python program file
(Hwk05_YourLastName.py) to the appropriate assignment in the LMS.
NOTE: As was described in the previous assignment, each Python file you create should
be documented with (minimally) the following three lines at the top of each file:
# Filename: Hwk03.py
# Author: <Your Name>
# Date Created: 2016/09/05
# Purpose: <brief description>
(*) pseudocode: a notation resembling a simplified programming language, used in
program design.

In: Computer Science

In lab you are going to be using drosophila flies with sepia mutations (SE, se) causing...

In lab you are going to be using drosophila flies with sepia mutations (SE, se) causing brown eyes found on chromosome 3 and apterous mutation (AP, ap) on chromosome 2 causing loss of wings. These are recessive mutations. Red eye is the wild-type phenotype. Assuming you have a female heterozygous at both loci. Draw the chromosomes as they go through meiosis (Make sure you show somatic cell, prophase I, metaphase I, metaphase II, gametes.) Draw all possible gametes. What percentage of each phenotype do you expect? What are all the possible phenotypes and genotypes would you expect? This female mates with a male that is also heterozygous at both loci and they have 1000 progeny.

1. What are all possible phenotypes you could recover?

A. Red eyes and wings OR Red eyes and no wings

B. Red eyes and wings OR Brown eyes and no wings

C. Red eyes and wings OR Brown eyes and wings

D. Red eyes and wings OR Brown eyes and wings OR Red eyes and no wings

E. Red eyes and wings OR Brown eyes and wings OR Red eyes and no wings OR Brown eyes AND no wings

2. What combination of phenotypes is displayed the most?

A. Red eyes and wings

B. Red eyes and no wings

C. Brown eyes and wings

D. Brown eyes and no wings

3. Out of 1000 progeny how many animals would have the most common combination of phenotypes?

Numeric Answer:

4. What combination of phenotypes is displayed the least?

A. Red eyes and wings

B. Red eyes and no wings

C. Brown eyes and wings

D. Brown eyes and no wings

5. Out of 1000 progeny how many animals would have the least common combination of phenotypes?

Numeric Answer:

6. What is the least probable genotype?

A. SE/se; AP/ap

B. se/se; ap/ap

C. SE/SE; AP/AP

D. SE/se; AP/AP

E. SE/se; ap/ap

7. What is the second least probable genotype?

A. SE/se; AP/ap

B. se/se; ap/ap

C. SE/SE; AP/AP

D. SE/se; AP/AP

E. SE/se; ap/ap

8. What percent of progeny will have the most common genotype?

A. 6.25

B. 12.5

C. 18.75

D. 25

E. None of the Above

9. You find a Red eye fly with wings. What is the probability this fly is homozygous SE/SE?

Word Answer:

10. You find a Red eye fly with wings. What animal could you cross this animal to, in order determine if its homozygous or heterozygous at the SE locus.

A. A Red eyed fly with wings

B. A Red eye fly with or without wings

C. A heterozygous Red eye fly with or without wings

D. A homozygous Red eye fly with or without wings

E. A brown eye fly with or without wings

11. What is the probability that this fly in male?

Word Answer:

In: Biology

Rules for this Assignment: There are 2 classes required for this project: Encryption (the primary class...

Rules for this Assignment:

There are 2 classes required for this project:

  • Encryption (the primary class containing your main() method and the retrieval of the message)
  • EncryptionProcedures (where your code regarding the encryption method of that message will be located)

Separation of code will be paramount in order to produce a proper and legible file. This will require that you analyse the problem and separate it into multiple tasks. Each task should then be represented by its own function.

The methods you define in the EncryptionProcedures class should be static.

Files to submit

               In a properly developed project, all your code should be located in 2 java files, Encryption.java and EncryptionProcedures.java. You will need to submit those 2 files.

               Additionally, a WORD document should also be submitted. In this document, you will explain the validity or invalidity of defining the methods in the EncryptionProcedures class as static. (minimum explanation, 5 lines)

Project Description

               The goal of the project is to be able to retrieve an input from the console, encrypt it according to specifications that will be described below, and display the result.

               The user input can be a single word, or an entire sentence (on a single line).

Specifications

private static final String[] arrPeriodicTableValues = {"h", "he", "li", "be", "b", "c", "n", "o", "f", "ne", "na", "mg", "al", "si", "p", "s", "cl", "ar", "k", "ca", "sc", "ti", "v", "cr", "mn", "fe", "co", "ni", "cu", "zn", "ga", "ge", "as", "se", "br", "kr", "rb", "sr", "y", "zr", "nb", "mo", "tc", "ru", "rh", "pd", "ag", "cd", "in", "sn", "sb", "te", "i", "xe", "cs", "ba", "la", "ce", "pr", "nd", "pm", "sm", "eu", "gd", "tb", "dy", "ho", "er", "tm", "yb", "lu", "hf", "ta", "w", "re", "os", "ir", "pt", "au", "hg", "tl", "pb", "bi", "po", "at", "rn", "fr", "ra", "ac", "th", "pa", "u", "np", "pu", "am", "cm", "bk", "cf", "es", "fm", "md", "no", "lr", "rf", "db", "sg", "bh", "hs", "mt", "ds", "rg", "cn", "nh", "fl", "mc", "lv", "ts", "og"};

               The preceding code represents all the elements of the periodic table in the form of an Array. The index of each element can be used to reference its atomic number. This instruction can be included in your code for use in this assignment.

               The encryption procedure will be a specific 1 and follow a strict set of rules in order to be properly implemented. The primary method will be called periodicEncrypt.

               Here is the overall description of the procedure to follow in order to accomplish a proper encryption in this case:

  1. Go through the original string from left to right
  2. Look at the first 2 characters
  3. Verify if those 2 characters match 1 of the elements in the periodic table
    1. If it does, use the atomic number as a replacement for those 2 characters
    2. If it doesn’t, go back and look at just 1 character
      1. Verify if that character matches 1 of the elements in the periodic table
        1. If it does, use the atomic number as a replacement for that character
        2. If it doesn’t, leave that character unchanged
  4. Repeat the process until you reach the end of the original string
  5. Display the encrypted String

In: Computer Science

Part 1: In each of the following scenarios, tell whether there is a violation of confidentiality,...

Part 1: In each of the following scenarios, tell whether there is a violation of confidentiality, integrity, or availability, or some combination of the three. In addition, for each item, write a two- or three-sentence paragraph explaining why your answer is correct.

Alex disables Barbara's router by logging in remotely with the manufacturer's default password.

Mallory builds a WiFi jammer using plans she found on the Internet and jams wireless signals over a large part of her apartment building.

Charlene uses a key logger to capture Darla's banking password.

Eve rewrites the magetic stripe on a gift card to change the amount from $10 to $100.

(Adapted from an exercise in Bishop, Matt, Introduction to Computer Security.)

Part 2: Distinguish among vulnerability, exploit, threat, risk, and control mechanism (called "countermeasure" in chapter one of the text) in five brief paragraphs. If you do any research outside the textbook, which you are encouraged to do, be sure to cite your sources. You can see how to do that in An Example of Proper Writing in the "Required Reading" section.

Part 3: Using the tool at http://www.fileformat.info/tool/hash.htm, compute the SHA-256 checksum of the MS-Word file that is your work on this assignment so far, or some similar file if you don't have that one available. Copy the calculated cryptographic hash into Windows Notepad or word processing document to save it temporarily. Now change one character from a capital to a lowercase letter or vice-versa in the original document, re-save, and recompute the the cryptographic hash. Paste the old and new cryptographic hashes into your homework document. Be sure to identify which one is before and which is after.

Using the information from the textbook, explain at least two uses for a cryptographic hash, and explain how the experiment you just performed confirms those uses.

Do some research and explain in a paragraph or so what a "hash collision" is. Be sure to cite your research.

Part 4: Explain in a couple of paragraphs how public key encryption can be used to implement a digital signature. Be sure you are very clear on when a private key is used and when a public key is used.

Part 5: Generally, a digital signature involves encrypting a cryptographic hash, or digest, generated from the message. Explain why we do we not encrypt the message itself. You can answer this question in one sentence.

Part 6: For each of the following scenarios below, tell what type of encryption is most appropriate and in a sentence or two explain the reasoning for your choice.

Alice wants to send a confidential message to Bill, whom she has never met and who lives in a distant country.

Charlie wants to be sure that no one but he can see the financial and medical records he has stored on his computer.

David needs a way to check that large computer files stored on corporate servers have not been modified.

Eddard uses a "cloud" backup service; he wants to be sure the operators of the service cannot read his files.

Frank needs to send a message to George. The message need not be confidential, but George must be assured that it actually came from Frank.

In: Computer Science